Skip to main content

Directory: All Listings 

Results 281 - 300 of 1237 This Category
All Listings

The Deep-Secure Chat Guard is one of our family of Content Inspection Guards.  It controls the use of Internet standard chat, to allow an organisation to make use of chat without putting sensitive information or critical business processes at risk. &nbsp ...

Deep-Secure Chat Guard
PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

German Informatics Society

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

SPAMfighter Exchange Module, SPAMfighter SMTP Anti Spam Server and SPAMfighter Hosted Spam Filter are the most effective and easy-to-use Spam Filters for protecting the company network against spam and phishing fraud. SPAMfighter Exchange Module (SEM), i ...

LogSat Software

We created SPAM Filter ISP to implement what many SMTP servers lack: Spam Filtering. SPAMFilter ISP's implementation is very simple. Its use is designed for ISPs and companies running their SMTP servers, not end-users. SPAM Filter ISP is designed to be a ...

The BrightCloud File Reputation Service provides next-generation Webroot threat intelligence by offering customers a dynamic, up-to-the-minute file reputation service to protect their data and assets. This real-time lookup service of known malicious and w ...

Category Guards Web
Global TSCM Group, Inc.

The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection w ...

Windows Bitlocker
Telemate.Net Software

NetSpective® is an accurate, easy-to-use, and reliable Internet content filtering device designed to maximize the availability and performance of critical network resources. It scans every piece of traffic coming in and out of the network and filters harm ...

Category Uncategorised
NetSpective

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...

Category Website Scanners

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email
J.A. Korsmeyer, Inc.

EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.

Extensible Messaging Platform
BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

edgescan

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
Applied Computer Security Association

The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you a ...

A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...

Category Website Scanners

Manage multiple ProxySG appliances in one place. Blue Coat Director gives you the power, control and visibility to ensure the success of your ProxySG deployment. Thanks to Director’s single, easy-to-use web interface, you can configure and manage all your ...

Blue Coat Director
Process Software

PreciseMail Anti-Spam Gateway is an enterprise solution that eliminates spam, phishing and virus threats at the Internet gateway or mail server. High Spam Detection Accuracy - PreciseMail Anti-Spam Gateway has a proven out-of-the-box spam detection accur ...